My sister passed away, and her boyfriend deleted data from her iPhone, he was hiding something, and we had to know what it was...”
- Android digital forensic investigations on a physical level from more than 540 locked Android devices bypassing any locks (pattern, pin and or password) by loading a proprietary boot loader without having to root the device.
- Physical extraction and advanced decoding for all Android OS versions including Android 4.x and 5.x.
- Digital forensic investigation from Android devices on a file system (logical) level including call logs, contacts, email, pattern locks, bookmarks, cookies, SMS/MMS, chat, locations, web history, images, videos & audio files, text files, deleted data, Wi-Fi, BlueTooth and geotag information etc.
- Deleted information retrieval from database files.
- Recovery of application data including Facebook, Facebook Messenger, Google+, PingChat! (aka Touch), Skype, Twitter, Viber, Yahoo Messenger, TigerText, Dropbox, QIP, Kik Messenger, Evernote, Kakao Talk, ICQ, Vkontakte etc.
- WhatsApp data extraction capabilities from select Android devices, using file system Android backup extraction.
- Decoding of call logs, contacts, email, pattern lock revealing from a full flash image, cBookmarks, cookies, SMS/MMS, chat, locations, web history, images, videos & audio files, text files, deleted data, Wi-Fi, BlueTooth and Geotag information.
- Decoding of smartphone applications including Kik, Kakaotalk, QIP, Evernote, New Viber, ICQ, Mail.ru and VKontakte.
- Decoding of application files including executable files (*.exe, jar files (Java Archive), Android application package files (APK) etc.